Architecture Overview

A topology diagram provides a visual representation that maps out the various services within an IP Address Management (IPAM) system, specifically in the context of TCPWave IPAM. This documentation section will delve into the details of each sub-component featured in the topology diagram, offering a clear and comprehensive view for network administrators on the health and status of each component within the network.

DNS Appliances

These are dedicated systems responsible for translating domain names into IP addresses. In a topology diagram, they indicate the operational state of the domain name system within the network.

DHCP Appliances

These appliances are responsible for assigning IP addresses to devices on the network. The diagram reflects their performance and status, ensuring efficient IP address management.

Discovery Engine

This engine scans the network to identify and catalog all connected devices and their characteristics. The topology diagram showcases the effectiveness and coverage of this scanning process.

CLI Engine

The Command Line Interface (CLI) Engine allows administrators to interact with the network and its components using text-based commands. The diagram illustrates the accessibility and health of this interface.

Data Engine

This is the central repository where all network data is processed and stored. The diagram indicates the health and efficiency of data processing and storage mechanisms.

Search Engine

This tool enables quick and effective searching through the network’s data. Its representation in the topology diagram reflects its operational status and efficiency.

Scheduler

The Scheduler is responsible for automating tasks within the IPAM system. The diagram shows its reliability and scheduling effectiveness.

NTP (Network Time Protocol)

This protocol synchronizes the clocks of all devices on the network. The topology diagram displays the status of this synchronization across the network.

Monitoring Engine

This engine continuously observes the network’s performance and health, alerting administrators to any issues. Its status in the topology diagram is crucial for proactive network management.

SNMP (Simple Network Management Protocol)

This protocol helps in managing devices on the IP network. The topology diagram shows how effectively SNMP is being used to monitor and manage network devices.

Data Replication

This involves duplicating data across the network to ensure consistency and reliability. The diagram indicates the status and efficiency of these replication processes.

By mapping these components, the topology diagram in TCPWave IPAM provides a detailed and dynamic overview of the network’s health and operational status, facilitating efficient management and rapid problem resolution.

Configuration Assurance

DHCP Version Matrix

The DHCP Appliance Version Matrix page is designed to present detailed version information for packages installed on remote TCPWave DHCP appliances in a clear, tabular format. This matrix includes searchable and sortable columns for comprehensive insights and quick access to specific data points. Below is an overview of the information provided in the DHCP Version Matrix:

  • Appliance Name: Identifies the name of the DHCP appliance.

  • Appliance Version: Indicates the version of the DHCP appliance.

  • DHCP: Displays the version of the DHCP package installed.

  • SNMP: Shows the version of SNMP (Simple Network Management Protocol) utilized by the TCPWave IPAM’s monitoring engine for deriving statistics.

  • SSH: Indicates the version of SSH (Secure Shell) used for secure access to the TCPWave IPAM, facilitating CLI actions.

  • NTP: Displays the version of NTP (Network Time Protocol) used to ensure the system clock’s accuracy.

  • TCPWave MQ: Indicates versions of TCPWave MQ, the message broker for TCPWave’s T-Message Secure Tunnel, enabling secure communication from the IPAM to remote devices.

  • Watchdog: Displays the version of the Watchdog package, a software monitoring tool.

  • TIMS DHCP Version: Indicates the version of TIMS DHCP, a component of the TCPWave IP Management Solution.

  • Patch Level: Displays the level of the patch applied, reflecting the current software update status.

  • BIOS: Indicates the version of BIOS (Basic Input/Output System) embedded on the computer’s motherboard, which controls various hardware devices.

  • Firmware: Displays the firmware version, providing low-level control for the appliance’s specific hardware devices.

  • Kernel: Indicates the version of the kernel, the essential interface between the hardware and operating system processes.

Functionality and Operations

Users interacting with the DHCP Version Matrix interface can perform several operations to enhance their experience and efficiency in accessing the data:

  • Refreshing the Page: Ensures that users are viewing the most current data by refreshing the version matrix.

  • Exporting Data: Offers the flexibility to export data into PDF, Excel, or CSV formats for offline analysis or reporting.

  • Adjusting Column Visibility: Allows users to customize the display by showing or hiding specific columns according to their preferences.

  • Printing Rows: Facilitates the printing of selected rows directly from the interface, useful for documentation or physical record-keeping.

  • Customizing Records Display: Users can customize the number of records displayed per page using a dropdown menu, catering to their viewing preferences.

This DHCP Version Matrix is an essential tool for network administrators and IT professionals managing TCPWave DHCP appliances, providing a centralized and intuitive interface for monitoring and managing version information across the network infrastructure.

DHCP Settings Matrix

The DHCP Settings Matrix provides a structured and comprehensive view of configuration parameters and settings available in TCPWave DHCP appliances, along with an Appliance Summary. This matrix is essential for efficiently managing DHCP behavior and IP address assignment to clients. It consists of two main tabs:

Configuration Tab

The Configuration tab presents configuration details of remote TCPWave DHCP appliances in a tabular format, with searchable and sortable columns:

  • Appliance Name: Identifies the name of the DHCP appliance.

  • Primary IPAM: Displays the IP address of the primary IPAM associated with the appliance.

  • DR IPAM: Indicates the IP address of the DR (Disaster Recovery) IPAM when configured.

  • SNMP Trap Targets: Shows the IP address of SNMP trap sinks.

  • TACACS+ Servers: Displays the IP address of TACACS+ servers.

  • Syslog Servers: Indicates the IP address of syslog servers.

  • NTP Servers: Shows the IP address of NTP (Network Time Protocol) appliances.

Appliance Summary Tab

The Appliance Summary tab provides details of DHCP appliances defined in the IPAM system, also presented in a tabular format with searchable and sortable columns:

  • Appliance Name: Identifies the name of the DHCP appliance.

  • Appliance IP: Displays the IP address of the appliance.

  • Status: Indicates the status of the appliance, with symbols denoting whether the appliance heartbeat is dead or alive.

  • Appliance Type: Specifies the type of appliance.

  • Scopes: Displays the number of scopes configured on the appliance.

  • Last Sync Status: Indicates the synchronization status (Fail/Success).

  • Last Sync Time: Displays the date and time of the previous synchronization.

Operations Available

Users interacting with the DHCP Settings Matrix interface can perform various operations to enhance usability and facilitate efficient management of DHCP settings and appliance information:

  • Refresh: Update the current page.

  • Export: Export visible rows to PDF, Excel, or CSV formats.

  • Copy: Copy visible rows.

  • Print: Print visible rows.

  • Column Visibility: Customize column visibility.

  • Reset Preferences: Restore default preferences.

  • Number Dropdown: Adjust the number of records displayed per page.

These functionalities ensure a streamlined and user-friendly experience, enabling administrators to effectively manage DHCP settings and monitor DHCP appliances within the network.

DNS Version Matrix

The DNS Version Matrix interface displays comprehensive version details for software packages installed on remote TCPWave DNS appliances. This information is organized in a grid format, featuring searchable and sortable columns for streamlined access to important data.

Columns Overview

  • Appliance Name: Identifies the DNS appliance by name.

  • Appliance Version: Shows the version number of the DNS appliance.

  • BIND: Displays the version of the BIND (Berkeley Internet Name Domain) package.

  • Unbound: Indicates the version of the Unbound DNS resolver package.

  • NSD (Name Server Daemon): Lists the version of the NSD package.

  • SNMP: Represents the Simple Network Management Protocol version used for monitoring.

  • SSH: Specifies the Secure Shell version for secure CLI access to the IPAM.

  • NTP: Shows the Network Time Protocol version for clock synchronization.

  • TCPWave MQ: Indicates the version of TCPWave’s secure messaging broker.

  • Watchdog: Displays the version of the Watchdog monitoring software.

  • AnyCast: Lists the version of AnyCast networking services.

  • TIMS DNS Version: Shows the version of TCPWave’s TIMS DNS software.

  • Patch Level: Indicates the applied patch level on the DNS appliance.

  • BIOS: Specifies the Basic Input/Output System version controlling the motherboard’s hardware.

  • Firmware: Displays the firmware version for low-level hardware control.

  • Kernel: Indicates the core operating system kernel version.

Additional Functionality

  • Number Dropdown: Enables users to adjust the number of records displayed per page, catering to various preferences for data review and management.

Common Functionalities

The DNS Version Matrix integrates several common functionalities to enhance user experience and interface customization:

  • Refresh: Updates the information displayed on the page to reflect the most current data.

  • Column Visibility: Allows users to customize which columns are visible, tailoring the display to their specific needs.

  • Reset Preferences: Resets the user interface to its default settings, clearing any personalized configurations.

  • More Options: Offers additional options for data management and display, further enhancing usability and access to information.

This matrix serves as a crucial tool for administrators, providing immediate access to version information across TCPWave DNS appliances, ensuring efficient management and monitoring of DNS infrastructure components.

DNS Settings Matrix

The DNS Settings Matrix offers a detailed overview of configuration parameters and summaries for TCPWave DNS appliances. It is divided into two main tabs: Configuration and Appliance Summary, each providing specific details conducive to effective DNS management.

Tabs Overview

  1. Configuration: This tab lays out the configuration details of TCPWave DNS appliances in an easily navigable table format.

  2. Appliance Summary: Offers a concise summary of all DNS appliances registered within the IPAM system, providing key insights at a glance.

Configuration Tab

Configuration details are accessible through a user-friendly table, featuring:

  • Appliance Name: Identifies the DNS appliance.

  • Primary IPAM: Displays the IP address of the primary IPAM server associated with the DNS appliance.

  • DR IPAM: Shows the IP address of the Disaster Recovery (DR) IPAM, if configured.

  • SNMP Trap Targets: Lists the IP addresses targeted for SNMP (Simple Network Management Protocol) traps.

  • TACACS+ Servers: Indicates the IP addresses of TACACS+ (Terminal Access Controller Access-Control System Plus) servers.

  • Syslog Servers: Specifies the IP addresses of syslog servers for logging.

  • NTP Servers: Presents the IP addresses of NTP (Network Time Protocol) servers for time synchronization.

Appliance Summary Tab

The Appliance Summary tab delineates DNS appliances with:

  • Appliance Name: Names the DNS appliance.

  • Appliance IP: Shows the appliance’s IP address.

  • Status: Displays the AMQ (Advanced Message Queuing Protocol) availability, highlighted in green for available and red for unavailable.

  • Appliance Type: Describes the type of DNS appliance.

  • DNSSEC Master Zone: Counts DNSSEC (Domain Name System Security Extensions) enabled zones where the appliance acts as master.

  • DNSSEC Slave Zone: Counts DNSSEC enabled zones where the appliance acts as slave.

  • Plain Master Zone: Totals forward zones with the appliance as master.

  • Plain Slave Zone: Totals forward zones with the appliance as slave.

  • Last Sync Status: Indicates the most recent sync status, whether Success or Fail.

Additional Functionalities

  • Number Dropdown: Enables the customization of displayed records per page, catering to user preference.

Common Functionalities

Users are afforded a suite of common functionalities for enhanced navigation and personalization, including:

  • Refresh: Updates the current page data.

  • Column Visibility: Allows personalization of visible columns to focus on relevant data.

  • Reset Preferences: Reverts settings to default for a fresh start.

  • More Options: Provides additional tools for data manipulation and interface customization.

The DNS Settings Matrix is a crucial component for administrators, streamlining the management and overview of DNS configurations and statuses within the TCPWave environment.

ADC Version Matrix

The ADC (Application Delivery Controller) Version Matrix page is meticulously designed to showcase the version details of software and firmware on TCPWave ADC appliances, making this information readily accessible in a structured grid layout. This matrix is invaluable for ensuring that all ADC appliances are up-to-date and functioning optimally.

Column Details

  • Appliance Name: Identifies each ADC appliance by name, simplifying inventory management.

  • Appliance Version: Shows the specific version of the ADC appliance, helping users track updates and compatibility.

  • SNMP: Reveals the version of SNMP (Simple Network Management Protocol) utilized, crucial for monitoring and managing devices on IP networks.

  • SSH: Details the version of SSH (Secure Shell) implemented, a protocol for securely accessing network services over an unsecured network.

  • NTP: Lists the version of NTP (Network Time Protocol) employed, ensuring that all devices within the network are synchronized to the same clock setting.

  • TCPWave MQ: Indicates the version of TCPWave’s T-Message Secure Tunnel message broker, enhancing secure communications within the network.

  • Watchdog: Displays the version of the Watchdog package, which monitors and provides recovery actions for the system.

  • AnyCast: Shows the version of AnyCast implemented, improving network performance and reliability.

  • TIMS ADC Version: Presents the specific version of TIMS ADC, indicating the software’s current iteration.

  • Patch Level: Reports the patch level applied, essential for security and functionality enhancements.

  • BIOS: Specifies the BIOS version, the firmware used to perform hardware initialization during the booting process.

  • Firmware: Lists the version of device firmware, providing necessary low-level control for the device’s specific hardware.

  • Kernel: Displays the operating system’s kernel version, the core component that provides basic services for all other parts of the OS.

Additional Functionality

  • Number Dropdown: This feature allows users to customize the number of records displayed per page, accommodating varying preferences for data review.

Common Functionalities

In addition to the specific data columns, the ADC Version Matrix supports several common functionalities that enhance the user experience:

  • Refresh: Updates the displayed data to ensure the latest information is shown.

  • Column Visibility: Users can adjust which columns are visible, allowing for a personalized view that focuses on the information most relevant to them.

  • Reset Preferences: This option allows users to revert to the default settings, useful for clearing customizations and starting anew.

  • More Options: Offers additional tools and options for data manipulation and interface customization, catering to advanced user needs.

This comprehensive approach ensures that administrators can efficiently manage and monitor the ADC appliance versions, maintaining the health and security of the network infrastructure.

ADC Settings Matrix

The ADC Settings Matrix provides a structured view of configuration details and appliance summaries for TCPWave ADC (Application Delivery Controller) appliances. This matrix is an essential tool for administrators, allowing for efficient management and fine-tuning of ADC appliances.

Tabs in ADC Settings Matrix:

  1. Configuration: Displays configuration information of remote TCPWave ADC appliances in a tabular format.

  2. Appliance Summary: Provides an overview of ADC appliances defined in the IPAM (IP Address Management) system.

Configuration Tab:

In the Configuration tab, the ADC Appliance Configuration Matrix presents configuration details in a table format with searchable and sortable columns:

  • Appliance Name: Identifies the name of the ADC appliance.

  • Primary IPAM: Displays the IP address of the primary IPAM associated with the appliance.

  • DR IPAM: Indicates the IP address of the DR (Disaster Recovery) IPAM when configured.

  • SNMP Trap Targets: Shows the IP addresses of SNMP trap targets.

  • TACACS+ Servers: Displays the IP addresses of TACACS+ servers.

  • Syslog Servers: Indicates the IP addresses of syslog servers.

  • NTP Servers: Shows the IP addresses of NTP (Network Time Protocol) servers.

Appliance Summary Tab:

The Appliance Summary tab presents details of ADC appliances in a table format, featuring searchable and sortable columns:

  • Appliance Name: Identifies the name of the ADC appliance.

  • Appliance IP: Displays the IP address of the appliance.

  • Status: Indicates the operational status of the appliance.

  • Appliance Type: Specifies the type of appliance.

  • Pools: Displays the number of pools configured on the appliance.

  • Last Sync Status: Indicates the synchronization status (Fail/Success).

  • Last Sync Time: Displays the date and time of the previous synchronization.

Operations Available:

Users can perform various operations from the ADC Settings Matrix interface, including:

  • Refresh: Refreshes the current page.

  • Export: Exports visible rows to PDF, Excel, or CSV formats.

  • Copy: Copies visible rows.

  • Print: Prints visible rows.

  • Column Visibility: Customizes the visibility of columns.

  • Reset Preferences: Restores default preferences.

  • Number Dropdown: Adjusts the number of records displayed per page.

These functionalities enhance usability and facilitate efficient management of ADC settings and appliance information.

IPAM Version Matrix

The IPAM Version Matrix offers a comprehensive and detailed view of the versions for the components within the IPAM system. Presented in a grid format, this matrix incorporates server-side pagination to enhance efficiency, with the capability for users to search and sort through the columns for specific information.

Column Details

  • Appliance Name: Defines the unique identifier for each appliance.

  • Appliance IP: Shows the IP address associated with the appliance.

  • Appliance Version: Details the current software version of the appliance.

  • CLI Engine: Describes the version of the command-line interface engine used for interactions via scripts or manually by users.

  • Data Engine: Indicates the version of the data integrity enforcement repository for DDI configurations.

  • Discovery: Points to the version of the network scanning engine that aids in automatic DNS entry creation.

  • Galera Cluster: Provides the version information of the Galera cluster, essential for database replication support.

  • Watchdog: Lists the version of the watchdog process for monitoring and maintaining system health.

  • NTP (Network Time Protocol): Specifies the version of the protocol ensuring accurate system time across devices.

  • Scheduler Engine: Reveals the version of the engine managing task scheduling and maintenance routines.

  • Search Engine: Indicates the version of TCPWave’s scalable search engine, optimized for IPAM indexing.

  • SNMP (Simple Network Management Protocol): Displays the version used for collecting system statistics.

  • SSH (Secure Shell): Details the version of SSH for secure administrative access.

  • TCPWave MQ: Identifies the version of the secure messaging system for communication with remote devices.

  • BIOS (Basic Input/Output System): Shows the firmware version for hardware initialization control.

  • Firmware: Lists the software version for low-level hardware control.

  • Kernel: Describes the version of the core operating system component.

Operations Available

In addition to specific data columns, the IPAM Version Matrix supports several functionalities for enhanced user interaction:

  • Refresh: Updates the display with the most current information.

  • Column Visibility: Allows personalization of visible columns to focus on relevant information.

  • Reset Preferences: Enables resetting to default views and settings.

  • More Options: Provides additional tools for data manipulation and interface customization.

This structure ensures that administrators can effectively oversee and manage the versioning of IPAM components, contributing to the stability and reliability of network infrastructure management.

IPAM Settings Matrix

The IPAM Settings Matrix provides a structured overview of configuration details and appliance summaries for TCPWave IPAM (IP Address Management) appliances. The matrix is organized into two main tabs, allowing access to configuration information and summarizing details about the appliances.

Tabs in IPAM Settings Matrix

  1. Configuration: Presents configuration details of TCPWave IPAM appliances in a grid format.

  2. Appliance Summary: Offers a tabular overview of IPAM appliances defined within the system.

Configuration Tab

The Configuration tab provides a detailed view of configuration settings with searchable and sortable columns:

  • Appliance Name: Specifies the name of the IPAM appliance.

  • SNMP Trap Targets: Displays the IP address of SNMP trap targets.

  • TACACS+ Servers: Shows the IP address of TACACS+ servers.

  • Syslog Servers: Provides the IP address of syslog servers.

  • NTP Servers: Lists the IP addresses of NTP (Network Time Protocol) servers.

Appliance Summary Tab

The Appliance Summary tab offers a comprehensive overview of IPAM appliances with searchable and sortable columns:

  • Sync Time: Indicates the synchronization date and time.

  • Appliance Name: Specifies the name of the IPAM appliance.

  • Appliance IP: Displays the IP address associated with the appliance.

  • Appliance Type: Identifies the type of appliance.

  • Status: Reports the last synchronization status of the appliance (Success/Fail).

  • Last Updated: Shows the date and time of the last update.

Additional Functionality

  • Number Dropdown: Allows users to customize the number of records displayed per page.

Common Functionalities

Users can also perform common operations such as:

  • Refresh: Updates the current data view.

  • Column Visibility: Provides options to customize visible columns.

  • Reset Preferences: Resets customizations to default settings.

  • More Options: Offers additional tools for data manipulation and interface customization.

This structure helps administrators efficiently manage and monitor IPAM appliance configurations and summaries, contributing to overall system stability and optimal network management.

IPv4 Policy Compliance

ADC Policy Compliance

The ADC Policy Compliance page provides insights into the compliance status of a remote ADC appliance’s hardware, software, and configuration details. The page organizes information into searchable and sortable column headers.

Column Details

  • Appliance Name: Identifies the name of the appliance.

  • Appliance IP: Displays the IP address of the appliance.

  • Policy Name: Specifies the group of compliance parameters.

  • Threshold Name: Indicates the name of the compliance parameter.

  • Expected Parameter: Displays the expected value of the threshold.

  • Actual Parameter: Shows the actual value of the threshold.

  • Parameter Compliance: Reflects the compliance status. If the parameter value matches the expected value, it is marked as “In Compliance”; otherwise, it is marked as “Not In Compliance.”

Compliance status is determined based on a comparison between expected and actual parameters.

Policy Name

The ADC Policy Compliance information includes various policies, each containing distinct compliance details:

  • TCPWave-HW-Check-Policy

  • TCPWave-OS-Check-Policy

  • TCPWave-Network-Check-Policy

  • TCPWave-Process-Check-Policy

  • TCPWave-Application-Check-Policy

  • TCPWave-NTP-Check-Policy

  • TCPWave-SNMP-Check-Policy

  • TCPWave-Syslog-ng-Check-Policy

Operations Available

You can perform various operations from the ADC Policy Compliance interface, including:

  • Run Policy Compliance: Executes the policy compliance check tool for a selected remote appliance.

  • Set Baseline: Baselines the actual values as expected values.

Running Policy Compliance

To execute policy compliance checks:

  1. Select the appliance(s) from the dropdown.

  2. Click “Run Policy Compliance.” A confirmation message appears asking if you want to proceed.

  3. Click “Yes.” A confirmation message indicates successful execution of ADC Policy Compliance checks.

Setting Baseline

To set a baseline:

  1. Select a record from the grid.

  2. Click “Set Baseline.” A confirmation message appears asking for confirmation.

  3. Click “Yes.” A confirmation message indicates successful baseline parameters setting.

Allow at least two minutes, which is the default Monitoring Notifications Processing Interval Time, to set the baseline after performing policy compliance checks.

Number Dropdown

Users can adjust the number of visible records using the dropdown menu.

Refer to the “Common Functionalities” section for information on Column Visibility and Reset Column Order.

This structured approach helps administrators efficiently manage and monitor the compliance of ADC appliances to ensure they adhere to established policies and standards.

DHCP Policy Compliance

The DHCP Policy Compliance page provides an overview of the compliance status concerning hardware, software, and configuration details for a remote DHCP appliance. It features sortable and searchable columns with the following headers:

Column Details

  • Appliance Name: Displays the name of the DHCP appliance.

  • Appliance IP: Shows the IP address of the DHCP appliance.

  • Policy Name: Displays the category of compliance parameters.

  • Threshold Name: Indicates the specific compliance parameter being monitored.

  • Expected Parameter: Shows the expected value for the threshold.

  • Actual Parameter: Displays the actual value of the threshold.

  • Parameter Compliance: Indicates whether the parameter complies with the expected value.

The compliance status is determined by comparing expected and actual parameters.

Policy Name

The DHCP Policy Compliance information includes various policies, each containing specific checkouts:

  • TCPWave-HW-Check-Policy: This policy provides information about hardware checkouts such as CPU count and temperature.

  • TCPWave-OS-Check-Policy: This policy focuses on hardware checkouts like Memory Usage and OS Version.

  • TCPWave-Network-Check-Policy: This policy covers network-related checkouts such as Network Duplex and Network Mask.

  • TCPWave-Process-Check-Policy: This policy provides information about running processes on the remote DHCP appliance.

  • TCPWave-Application-Check-Policy: This policy focuses on global configurations in the IP Address Management (IPAM) system and their actual settings.

  • TCPWave-DHCP-Check-Policy: This policy compares dhcpd.conf file parameters on the remote appliance with those configured in the IPAM.

  • TCPWave-NTP-Check-Policy: This policy compares ntp.conf file parameters on the remote appliance with those configured in the IPAM.

  • TCPWave-SNMP-Check-Policy: This policy compares snmpd.conf file parameters on the remote appliance with those configured in the IPAM.

  • TCPWave-Syslog-ng-Check-Policy: This policy compares rsyslog.conf file parameters on the remote appliance with those configured in the IPAM.

Operations

From the DHCP Policy Compliance Information interface, users can perform various operations:

  • Run Policy Compliance: Executes policy compliance checks for selected remote appliances or appliance groups.

    • Appliance Group: Select and run checks for all/individual appliance groups.

    • Appliance: Select and run checks for all/individual appliances.

  • Set Baseline: Establishes baseline values for actual parameters.

    • Select a record from the grid, click “Set Baseline,” confirm, and receive a success message.

    • Allow at least two minutes, the default Monitoring Notifications Processing Interval Time, after performing compliance checks to set the baseline.

Additionally, users can adjust the number of visible records, export visible rows to PDF/Excel/CSV, copy visible rows, or print them.

Refer to the “Common Functionalities” section for details on Column Visibility and Reset Column Order.

This structured approach ensures administrators can efficiently manage and monitor the compliance of DHCP appliances to adhere to established policies and standards.

DNS Policy Compliance

The DNS Policy Compliance page presents a grid format displaying the compliance status of a remote DNS appliance’s hardware, software, and configuration information. It includes various searchable and sortable column headers:

Column Details

  • Appliance Name: Displays the name of the appliance.

  • Appliance IP: Displays the IP address of the appliance.

  • Policy Name: Indicates the group of compliance parameters.

  • Threshold Name: Specifies the name of the compliance parameter.

  • Expected Parameter: Shows the expected value of the threshold.

  • Actual Parameter: Displays the actual value of the threshold.

  • Parameter Compliance: Shows the compliance status. It indicates whether the actual parameter value meets the expected value (In Compliance) or not (Not In Compliance).

Compliance status is determined based on the comparison between expected and actual parameters.

Policy Name

The DNS checkout information is categorized into different policies, each containing specific checkouts:

  • TCPWave-HW-Check-Policy: Provides information about hardware checkouts such as CPU count and temperature.

  • TCPWave-OS-Check-Policy: Focuses on hardware checkouts like Memory Usage and OS Version.

  • TCPWave-Network-Check-Policy: Covers network-related checkouts such as Network Duplex and Network Mask.

  • TCPWave-Process-Check-Policy: Provides information about running processes on the remote DNS appliance.

  • TCPWave-Application-Check-Policy: Focuses on global configurations in the IP Address Management (IPAM) system and their actual settings.

  • TCPWave-BIND-Check-Policy: Checks the BIND configurations on the remote DNS appliance.

  • TCPWave-NSD-Check-Policy: Checks the NSD configurations on the remote DNS appliance.

  • TCPWave-UNBOUND-Check-Policy: Checks the UNBOUND configurations on the remote DNS appliance.

  • TCPWave-NTP-Check-Policy: Compares ntp.conf file parameters on the remote appliance with those configured in the IPAM.

  • TCPWave-SNMP-Check-Policy: Compares snmpd.conf file parameters on the remote appliance with those configured in the IPAM.

  • TCPWave-Syslog-ng-Check-Policy: Compares rsyslog.conf file parameters on the remote appliance with those configured in the IPAM.

  • TCPWave-GSS-TSIG-Check-Policy: Compares GSS-TSIG configurations on the remote DNS appliance.

Operations

From the DNS Policy Compliance Information interface, users can perform various operations:

  • Run Policy Compliance: Executes the policy compliance check tool for a selected remote appliance or appliance group.

  • Set Baseline: Allows baselining the actual values as expected values for selected records.

  • Export: Options to export visible rows to PDF, Excel, or CSV.

  • Copy and Print: Options to copy or print visible rows.

  • Number Dropdown: Select the number of records to be displayed.

  • Common Functionalities: Includes Refresh, Column Visibility, and Reset Preferences.

Running Policy Compliance

Users can run policy compliance checks for either an appliance group or individual appliance. After selection, they need to confirm to proceed.

Setting Baseline

This feature enables users to baseline the actual values as expected values for selected records. After selecting records, users confirm the action, and the system validates the successful baseline setting.

After performing policy compliance checks, users must wait at least two minutes, which is the default Monitoring Notifications Processing Interval Time, to set the baseline.

Refer to the “Common Functionalities” section for details on Column Visibility and Reset Preferences.

This structured approach helps administrators efficiently manage and monitor the compliance of DNS appliances to adhere to established policies and standards.

IPAM Policy Compliance

The IPAM Policy Compliance page provides a comprehensive view of the compliance status of a remote IPAM appliance’s hardware, software, and configuration details. The page features sortable and searchable columns that display various details:

Column Details

  • Appliance Name: Indicates the name of the appliance.

  • Appliance IP: Shows the IP address of the appliance.

  • Policy Name: Displays the group of compliance parameters.

  • Threshold Name: Specifies the name of the compliance parameter.

  • Expected Parameter: Shows the expected value of the threshold.

  • Actual Parameter: Indicates the actual value of the threshold.

  • Parameter Compliance: Displays the compliance status, indicating whether the parameter value meets the expected value (In Compliance) or not (Not In Compliance).

Compliance status is determined by comparing expected and actual parameters.

Common Functionalities

You can utilize the following functionalities on this page:

  • Refresh: Updates the information displayed on the page.

  • Column Visibility: Customizes which columns are visible.

  • Reset Preferences: Restores default settings.

  • More Options: Provides additional functionalities based on your role permissions.

Note: Some functionalities may be enabled or disabled depending on your assigned role.

Policy Name

The IPAM checkout information is categorized into different policies, each containing various checkouts. These policies include:

  • TCPWave-Application-Check-Policy: Focuses on global configurations and their actual settings in the IPAM system.

  • TCPWave-Database-Check-Policy: Checks database configurations and integrity.

  • TCPWave-HW-Check-Policy: Provides information about hardware checkouts such as CPU count and temperature.

  • TCPWave-OS-Check-Policy: Focuses on hardware checkouts like memory usage and OS version.

  • TCPWave-Network-Check-Policy: Covers network-related checkouts such as network duplex and network mask.

  • TCPWave-Storage-Check-Policy: Provides details on storage-related checkouts.

Each policy has specific thresholds and parameters to check compliance.

Running Policy Compliance

You can execute the policy compliance check tool for a selected remote appliance or appliance group.

  • Appliance Group:

    1. Select the desired appliance group from the dropdown.

    2. Click “Run Policy Compliance” and confirm the action.

  • Appliance:

    1. Choose the desired appliance from the dropdown.

    2. Click “Run Policy Compliance” and confirm the action.

Setting Baseline

You can set baseline values for actual parameters as expected values.

  1. Select a record from the grid.

  2. Click “Set Baseline” and confirm the action.

  3. Wait for at least two minutes for the baseline to be set, which is the default Monitoring Notifications Processing Interval Time.

After performing policy compliance checks and setting baselines, you will receive validation messages confirming the actions taken.

IPv6 Policy Compliance

IPv6 DHCP Policy Compliance

The IPv6 DHCP Policy Compliance page provides a comprehensive overview of the compliance status regarding the hardware, software, and configuration details of a remote IPv6 DHCP appliance.

Key Components

  1. Column Headers:

    • Appliance Name: Displays the name of the appliance.

    • Appliance IPv6: Displays the IPv6 address of the appliance.

    • Policy Name: Displays the group of compliance parameters.

    • Threshold Name: Displays the name of the compliance parameter.

    • Expected Parameter: Displays the expected value of the threshold.

    • Actual Parameter: Displays the actual value of the threshold.

    • Parameter Compliance: Indicates whether the actual parameter complies with the expected value. If they match, it’s marked as “In Compliance”; otherwise, it’s marked as “Not In Compliance.”

  2. Policy Name and Checkouts:

    • The IPv6 DHCP checkout information is categorized into different policies, each containing various checkouts.

    • Policies include:
      • Hardware checks

      • Operating System checks

      • Network checks

      • Process checks

      • Application checks

      • DHCP-specific checks

      • NTP-specific checks

      • SNMP-specific checks

      • Syslog-ng-specific checks

  3. Examples of Thresholds and Parameters:

    • Each policy contains specific thresholds and parameters to check compliance. For instance:
      • TCPWave-HW-Check-Policy: Checks hardware-related parameters such as CPU count, temperature, firmware version, etc.

      • TCPWave-OS-Check-Policy: Verifies OS-related parameters like version, memory usage, CPU usage, etc.

      • TCPWave-Network-Check-Policy: Validates network-related parameters such as duplex, speed, mask, etc.

      • TCPWave-Process-Check-Policy: Examines running processes like DHCP, SNMP, and NTP services, etc.

      • TCPWave-Application-Check-Policy: Focuses on application-specific configurations such as DHCP subnet count, scopes count, root access settings, etc.

  4. Operations Available:

    • Users can execute various operations from the interface, including running policy compliance, setting baselines, and exporting data.

    • Options include exporting visible rows to PDF, Excel, or CSV, copying visible rows, and printing visible rows.

  5. Run Policy Compliance:

    • Allows users to execute policy compliance checks for selected remote appliances.

    • Steps involve selecting appliances, clicking “Run Policy Compliance,” confirming the action, and receiving a success message.

  6. Set Baseline:

    • Enables users to baseline actual values as expected values.

    • Steps include selecting a record, running policy compliance, waiting for at least two minutes, and receiving a confirmation message.

This system provides a comprehensive approach to ensuring compliance with IPv6 DHCP policies, covering a wide range of parameters and offering convenient operations for managing compliance checks.

IPv6 DNS Policy Compliance

The IPv6 DNS Policy Compliance page provides a detailed overview of the compliance status of remote DNS appliances. The compliance status is displayed in a grid format, showcasing the hardware, software, and configuration details of each appliance.

Column Headers

The following are the column headers displayed on the IPv6 DNS Policy Compliance page:

  • Appliance Name: The name of the appliance.

  • Appliance IPv6: The IPv6 address of the appliance.

  • Policy Name: The group of compliance parameters being monitored.

  • Threshold Name: The specific compliance parameter being checked.

  • Expected Parameter: The expected value of the threshold parameter.

  • Actual Parameter: The actual value of the threshold parameter.

  • Parameter Compliance: Indicates whether the parameter value is “In Compliance” (matches the expected parameter) or “Not In Compliance” (does not match the expected parameter).

Policy Names and Checkouts

IPv6 DNS checkout information is categorized into different policies, each containing various compliance checks:

  • TCPWave-HW-Check-Policy: Checks hardware parameters such as CPU count and temperature.

  • TCPWave-OS-Check-Policy: Checks OS parameters such as OS version and memory usage.

  • TCPWave-Network-Check-Policy: Checks network parameters such as network mask and duplex.

  • TCPWave-Process-Check-Policy: Monitors running processes on the appliance.

  • TCPWave-Application-Check-Policy: Monitors global options and their actual configurations.

  • TCPWave-BIND-Check-Policy: Compares parameters in the named.conf file.

  • TCPWave-NSD-Check-Policy: Compares parameters in the nsd.conf file.

  • TCPWave-Unbound-Check-Policy: Compares parameters in the unbound.conf file.

  • TCPWave-Zebra-Check-Policy: Compares parameters in the zebra.conf file.

  • TCPWave-BGP-Check-Policy: Compares parameters in the bgpd.conf file.

  • TCPWave-NTP-Check-Policy: Compares parameters in the ntp.conf file.

  • TCPWave-SNMP-Check-Policy: Compares parameters in the snmpd.conf file.

  • TCPWave-Syslog-ng-Check-Policy: Compares parameters in the rsyslog.conf file.

  • TCPWave-GSS-TSIG-Check-Policy: Checks parameters related to Kerberos configuration.

Operational Functions

  • Run Policy Compliance: Execute the policy compliance check tool for selected appliances or appliance groups.

  • Set Baseline: Baseline actual values as expected values for selected records.

  • Export: Export visible rows to PDF, Excel, or CSV formats.

  • Copy: Copy visible rows.

  • Print: Print visible rows.

Number Dropdown

  • Select the number of records to be displayed on the page.

Run Policy Compliance

  • Appliance Group: Run policy compliance checks on selected appliance groups.

  • Appliance: Run policy compliance checks on selected appliances.

Set Baseline

  • Select records or all records from the grid.

  • Confirm baseline setting.

  • Wait at least two minutes after policy compliance checks before setting the baseline.

This system provides an efficient method for ensuring compliance with IPv6 DNS policies, offering comprehensive checks and convenient operations for managing compliance and setting baselines.

IPv6 IPAM Policy Compliance

The IPv6 IPAM Policy Compliance page provides an overview of the compliance status of remote IPAM (IP Address Management) appliances. The compliance status is displayed in a grid format, showcasing hardware, software, and configuration details of each appliance.

Column Headers

The following are the column headers displayed on the IPv6 IPAM Policy Compliance page:

  • Appliance Name: The name of the appliance.

  • Appliance IPv6: The IPv6 address of the appliance.

  • Policy Name: The group of compliance parameters being monitored.

  • Threshold Name: The specific compliance parameter being checked.

  • Expected Parameter: The expected value of the threshold parameter.

  • Actual Parameter: The actual value of the threshold parameter.

  • Parameter Compliance: Indicates whether the parameter value is “In Compliance” (matches the expected parameter) or “Not In Compliance” (does not match the expected parameter).

Compliance Status

Compliance status is determined based on the comparison between expected and actual parameters. If the actual parameter matches the expected parameter, the compliance status is “In Compliance”; otherwise, it is “Not In Compliance.”

Policy Names

IPv6 IPAM checkout information is categorized into different policies, each containing various compliance checks:

  • TCPWave-Application-Check-Policy: Monitors application-specific settings.

  • TCPWave-Database-Check-Policy: Monitors database configurations and parameters.

  • TCPWave-HW-Check-Policy: Checks hardware parameters such as CPU count and temperature.

  • TCPWave-OS-Check-Policy: Checks OS parameters such as OS version and memory usage.

  • TCPWave-Network-Check-Policy: Checks network parameters such as network mask and duplex.

  • TCPWave-Storage-Check-Policy: Monitors storage configurations and performance.

Running Policy Compliance

  • Run Policy Compliance: Execute policy compliance checks for selected remote appliances or appliance groups.
    • Appliance Group: Run policy compliance checks on selected appliance groups.

    • Appliance: Run policy compliance checks on selected appliances.

  • Steps involve selecting either appliance groups or individual appliances from the dropdown menu, clicking “Run Policy Compliance,” and confirming the action.

Setting Baseline

  • Set Baseline: Set actual values as expected values for a particular record.
    • Steps include selecting a record from the grid, clicking “Set Baseline,” confirming the action, and waiting for at least two minutes after policy compliance checks before setting the baseline.

After performing policy compliance checks, users must wait at least two minutes (the default Monitoring Notifications Processing Interval Time) before setting the baseline.

This system provides an efficient approach to ensuring compliance with IPv6 IPAM policies, offering comprehensive checks and convenient operations for managing compliance and setting baselines.

DNS Tools

The DNS Tools section within TCPWave IPAM offers various functionalities for managing and diagnosing DNS-related aspects of your network infrastructure. To access these tools, navigate to ‘Infrastructure Management’ and select ‘DNS Tools’. The availability of specific tools depends on your administrative role permissions; refer to the ‘Administrator Roles’ section for more details.

DNS Convergence Tool

The DNS Convergence tool is essential for verifying the presence of specific Resource Records across DNS appliances in your network. Here’s how it works:

  • Functionality: Queries (“dig”) Resource Records on DNS appliances.

  • Indicators:
    • Records highlighted in red are absent on a DNS appliance.

    • Records shown in green are present, indicating synchronization feasibility.

  • Usage Process:
    • Step 1: Select your organization.

    • Step 2: Choose the type of record you’re querying.

    • Step 3: Select the Primary Domain (auto-populated based on the chosen organization).

    • Step 4: Enter the short name for the resource record.

    • Step 5: Submit your query.

  • Output: Details are displayed in the ‘Resource record details on its DNS Appliances grid,’ which includes searchable and sortable columns like Appliance IP, Appliance Name, Appliance Type (Master/Slave), Resource Record, Resolves To, and Status.

  • Additional Operations: You can sync, refresh, export data (to PDF, Excel, CSV), copy, or print the visible rows. Adjust the number of displayed records using a dropdown menu.

IDN Converter

The IDN Converter is a specialized tool for managing Internationalized Domain Names (IDNs), allowing for domain names in non-ASCII characters.

  • Generating Punycode:
    • Open the IDN Converter pop-up.

    • Enter the IDN (Internationalized Domain Name) in the designated field.

    • Click ‘Generate Punycode’.

    • The generated Punycode appears in its field.

    • Use ‘Clear’ to reset data, or ‘Cancel’ to exit.

    • Example: Entering the IDN ‘köln.studenten-wohnung.de’ generates the Punycode ‘xn–kln-sna.studenten-wohnung.de’.

  • Generating IDN:
    • Access the IDN Converter.

    • Enter Punycode in its field.

    • Click ‘Generate IDN’.

    • The converted IDN appears.

    • Options to clear or cancel are also available.

    • Example: Inputting the Punycode ‘xn–kln-sna.studenten-wohnung.de’ converts it back to the IDN ‘köln.studenten-wohnung.de’.

In essence, the DNS Tools in TCPWave IPAM provide a comprehensive suite for monitoring, converting, and managing DNS and IDN records, crucial for maintaining the integrity and efficiency of your network’s DNS infrastructure.

DNSDiag

DNSDiag in TCPWave IPAM is a comprehensive toolset designed for assessing and diagnosing DNS performance and integrity. Among the tools it supports, DNSDiag currently offers dnsping, a robust utility focused on measuring the response times of DNS servers. This suite is vital for ensuring optimal DNS operation, diagnosing issues, and making informed decisions about network infrastructure.

Overview of DNSDiag

DNSDiag is crafted to assist network administrators in analyzing DNS network performance. It comprises various diagnostic tools, of which dnsping is currently supported by TCPWave IPAM. These tools are essential for ensuring efficient DNS operations and diagnosing network issues.

DNSPing Tool

DNSPing is a specialized tool within DNSDiag used for evaluating the latency and operational health of DNS appliances. It functions by sending DNS queries to specified appliances and measuring the response time.

  • Target Selection: Choose the specific DNS appliance for testing.

  • Hostname Resolution: Input the hostname for DNS resolution.

  • Record Type: Select the DNS record type for the query.

  • Query Count: Determine the number of resolution attempts to make (between 1 and 100).

  • DNSSEC: Option to enable DNSSEC for enhanced query security.

  • Protocol Flag: Choose the protocol (UDP/TCP) for the DNS query.

  • Execution: Submitting the form initiates the DNSPing process.

Output and Interpretation

The results from DNSPing are presented in a detailed format, aiding in analysis and troubleshooting:

  • dnsping.py: Identifier for the Python script executing the ping operation.

  • DNS IP Address: Shows the IP of the targeted DNS server, typically on port 53.

  • Hostname: Reflects the hostname subjected to the DNS query.

  • Protocol: Indicates whether UDP or TCP was used for the query.

  • Resource Record Type: Type of DNS record queried.

  • Flags: Represents the query’s nature, such as ‘Recursion Desired’.

  • Request Timeout: Alerts if the query failed to receive a response within the set timeframe.

The summary, or ‘dnsping statistics’, offers a concise overview of the test’s outcome. For example, a report showing “5 requests transmitted, 0 responses received, 100% lost” with all response time metrics at 0.000 ms signals complete non-responsiveness from the tested DNS server. This lack of response could stem from various issues such as network problems, server configuration errors, or restrictive firewall settings.

By utilizing DNSPing within the DNSDiag suite, network administrators can gain critical insights into the performance and reliability of their DNS infrastructure. This tool is instrumental in diagnosing DNS-related problems and ensuring efficient and reliable DNS operations within an organization’s network.

DNSSEC Key Management

In TCPWave IPAM, the DNSSEC Key Expiry Information page plays a crucial role in managing and monitoring the security of DNS zones through DNSSEC (Domain Name System Security Extensions) keys. This page provides comprehensive insights into the status of DNSSEC keys within your network. Here’s a breakdown of the functionalities and features of the DNSSEC Key Expiry Information page:

Key Signing Pairs

  • ZSK (Zone Signing Key) and KSK (Key Signing Key): Every DNS zone has a ZSK for signing DNS records within the zone and a KSK for signing the ZSK itself.

  • Private and Public Key Names: Both ZSK and KSK have respective private and public key names, essential for DNSSEC’s operation.

Configuration

  • The validity periods for both ZSK and KSK can be configured in the “Global Policy Management” section of TCPWave IPAM.

  • This allows for customization based on your organization’s security needs and policies.

DNSSEC Key Expiry Information Page

This page presents a detailed and organized view of the DNSSEC keys for all managed zones. It includes various columns providing specific information:

  • Zone Name: Shows the name of the DNS zone.

  • Organization: Indicates the organization that the zone belongs to.

  • Private Key Name: Displays the name of the zone’s private key.

  • Public Key Name: Shows the name of the zone’s public key.

  • Is KSK: Identifies whether the key is a KSK (‘Yes’) or a ZSK (‘No’).

  • Key Status: Indicates the current status of the key (e.g., ‘new’ or ‘old’).

  • Key Activation Date: Shows when the ZSK or KSK was activated.

  • Key Revoke Date: Displays the date and time when the ZSK or KSK was revoked.

  • Key Inactive Date: Indicates when the ZSK or KSK became inactive.

  • Key Delete Date: Shows when the ZSK or KSK was deleted from the system.

Interactive Features

  • Searchability and Sortability: Each column header is searchable and sortable, making it easier to find specific key details among numerous records.

  • Number Dropdown: Allows users to select the number of records to view at once, enhancing the user interface’s adaptability to different user needs.

Additional Resources

  • For more detailed instructions on using the search functionality within this grid, refer to the “Grid Search” section in the documentation.

The DNSSEC Key Expiry Information page in TCPWave IPAM is an indispensable tool for network administrators, providing critical insights into the security status of DNS zones through meticulous tracking and management of ZSK and KSK key pairs. This functionality is vital for maintaining the integrity and security of DNS operations within your organization’s network infrastructure.

IDN Converter

The IDN Converter is a tool within TCPWave IPAM that allows you to convert non-ASCII domain names to Punycode and vice versa. This utility supports Internationalized Domain Names (IDNs), enabling you to work with domain names in any language. Here’s how to use the IDN Converter:

Generating Punycode

To generate Punycode from an IDN:

  • Open the IDN Converter: Navigate to the IDN Converter tool. The system displays the IDN Converter pop-up.

  • Enter the IDN: Input the desired IDN (Internationalized Domain Name) in the designated IDN field.

  • Generate Punycode: Click ‘Generate Punycode’ to generate the Punycode. The Punycode will appear in the Punycode field.

  • Clear data: Click ‘Clear’ to reset the fields if necessary.

  • Cancel: Click ‘Cancel’ to exit without making changes.

Example: Enter the IDN ‘köln.studenten-wohnung.de’ in the IDN field. The generated Punycode is ‘xn–kln-sna.studenten-wohnung.de’.

Generating IDN

To generate an IDN from Punycode:

  • Open the IDN Converter: Navigate to the IDN Converter tool. The system displays the IDN Converter pop-up.

  • Enter Punycode: Input the desired Punycode in the Punycode field.

  • Generate IDN: Click ‘Generate IDN’ to convert the Punycode back to the IDN. The converted IDN will appear in the IDN field.

  • Clear data: Click ‘Clear’ to reset the fields if necessary.

  • Cancel: Click ‘Cancel’ to exit without making changes.

Example: Enter the Punycode ‘xn–kln-sna.studenten-wohnung.de’ in the Punycode field. The generated IDN is ‘köln.studenten-wohnung.de’.

The IDN Converter is a useful tool for managing and converting domain names in non-ASCII characters, making it an essential utility for network administrators who need to handle internationalized domain names efficiently.

Fault Management

Alarm Subscription

Alarm Subscription in TCPWave IPAM is a tool designed to enhance network monitoring by providing notifications through various messaging platforms. It is essential for maintaining oversight on network activities and ensuring immediate responses to potential issues.

General Overview

  • Purpose: Alarm Subscription notifies users about critical or warning alerts related to the network’s status.

  • Accessibility: Only Functional and Super Administrators can create alarm subscriptions.

  • Permissions: Availability of this feature depends on the user’s role. For more details, refer to the ‘Administrator Roles’ section.

Adding a Subscription

To set up a new alarm subscription:

  1. Navigate to the Alarm Subscription section: Go to ‘Infrastructure Management’ -> ‘Fault Management’ -> ‘Alarm Subscriptions’.

  2. Add a Subscription: - Click on ‘Add Subscription’ to open a popup with several fields. - Organization: Choose an organization from the dropdown menu. - Alerting Properties: Specify the conditions that trigger the alarm. - Messaging Properties: Select a messaging platform for receiving alerts. Options include Email, Google Chat, Microsoft Teams, Pager Duty, Slack, and Telegram. - Depending on the chosen messaging platform, provide necessary information such as contact details, webhook URLs, subscription names, token IDs, channel IDs, integration keys, etc. - Global Email Options: If using Email, ensure SMTP global options like ‘Enable Authentication To Send An Email’ and ‘Enable Email SSL Server Identity To Send An Email’ are set to ‘yes’. - After completing the fields, click ‘OK’. The new subscription will appear in the Alarm Subscriptions grid.

Deleting a Subscription

  1. Process: - Select the subscription record from the grid. - Click on the ‘Delete’ icon. - A confirmation message will appear upon successful deletion.

Context Menu

  • Access: Right-click on a subscription in the grid to access the context menu.

  • Function: The menu provides quick access to options such as ‘Delete’.

  • For further information, refer to the ‘Deleting Subscription’ section.

Grid Display

  • The grid dynamically displays data based on the selected messaging type.

  • For instance, if Email is chosen: - Select threshold values like ‘DNS Heart Beat’ or ‘DHCP Heart Beat’. - Choose components such as ‘IPAM1’ or ‘IPAM2’. - Select contacts (e.g., ‘test1’, ‘test2’). - The system will display a combination of these selections (threshold*component*contact) in the grid.

  • For other messaging types, the display is based on threshold*component values.

Conclusion

The Alarm Subscription feature in TCPWave IPAM is an invaluable tool for administrators, allowing them to stay informed about the network’s status through real-time alerts. By utilizing this feature, administrators can ensure prompt attention to network issues, enhancing overall network reliability and performance.

Current Alarms

TCPWave’s Fault Management system is an advanced feature designed to monitor and manage the status of IPAM and remote components, ensuring seamless network operations. Using protocols like ICMP and SNMP, it continuously monitors the network, triggering notifications to the network administrator when faults or events occur.

SNMP Trap Forwarding

  • Purpose: SNMP (Simple Network Management Protocol) traps inform about system events or threats within the TCPWave ecosystem.

  • Configuration Steps:
    • Trap Target: Specify IP addresses as destinations for SNMP traps in a comma-separated list in the Global Options section.

    • Global Community Strings: Define the global SNMP community strings used by the IPAM infrastructure as valid secret keys.

    • Send SNMP Traps to Third Party: Enable or disable forwarding of SNMP traps to a third-party system.

    • SNMP Response Timeout: Set the response timeout for SNMP, with allowed values between 1 and 10,000 ms.

    • Maximum Allowed SNMP Request Retries: Determine the number of retries for failed SNMP requests, with a range of 1 to 5 attempts.

Health Index Score (TICO Score)

  • Overview: The Health Index Score, known as the TICO (TCPWave Infrastructure Computed Overall) score, is a crucial metric displaying the overall health of the IPAM system. It assesses:
    • IPAM Health: Evaluates the functionality and reliability of the IPAM system.

    • REST Failure Rate: Monitors the failure rate of RESTful API calls.

    • DHCP and DNS Alerts: Tracks alerts from DHCP and DNS systems.

    • Disaster Recovery Health: Assesses disaster recovery preparedness.

  • Scoring Methodology: TICO scores range from “Critical” (<30) to “Exceptional” (100), providing a clear overview of the system’s health.

Component Health Scoring

  • Each component (DNS, DHCP, or IPAM) starts with a health score of 100.

  • For every critical alert, 2 points are deducted.

  • If a component’s score drops below zero, it is considered zero.

  • A score of zero is immediately assigned if all appliances in a DNS or DHCP component are non-operational.

TICO Score Computation

  • The TICO score is an aggregate of weighted health scores from DNS (30%), DHCP (30%), and IPAM (40%).

Current Alarms

  • Functionality: View and manage alarms based on types such as Critical, Warning, OK, Unknown, or All.

  • Alarm Management Operations:
    • Force Recheck: Manually re-initiate monitoring checks for an updated status.

    • Acknowledging Alarms: Confirm and log acknowledgment of an alarm.

    • Unacknowledging Alarms: Revert the acknowledgment status of an alarm.

    • Deleting Alarms: Remove an alarm from the system.

  • Grid Display Features:
    • Columns can be sorted and searched, showing details such as Last Check, Start Duration, Host IP/Name, Service, and Acknowledgment status.

    • Right-clicking on an alarm record accesses a context menu for quick actions such as Force Recheck, Acknowledge, Unacknowledge, and Delete.

In summary, TCPWave’s Fault Management system empowers network administrators to proactively monitor, assess, and respond to various network components’ statuses and alerts. Its advanced features such as SNMP Trap Forwarding, Health Index Score, and a robust alarm management interface contribute significantly to maintaining and enhancing network reliability and performance.

Monitored Appliances

The Monitored Appliances feature in TCPWave IPAM plays a critical role in overseeing the performance and status of DNS, DHCP, and ADC appliances within the network infrastructure. It provides network administrators with the necessary tools to manage and monitor these appliances efficiently.

Operations Monitored Appliances Interface

  1. Enable Monitoring:

    • Purpose: Activates monitoring for selected appliances to track their status and performance.

    • Process:
      • Right-click on an appliance in the grid to access the context menu.

      • Select ‘Enable Monitoring’.

      • Confirm the action by clicking ‘YES’ on the validation message.

      • A confirmation message stating “Monitoring status has been changed successfully” appears.

      • Click ‘OK’ to complete the process.

  2. Disable Monitoring:
    • Purpose: Stops monitoring for selected appliances, halting the tracking of their status.

    • Process:
      • Right-click on an appliance and select ‘Disable Monitoring’ from the context menu.

      • Confirm deactivation by clicking ‘YES’ in the validation dialog.

      • Acknowledge the successful change in monitoring status by clicking ‘OK’.

  3. Set DNS QPS (Queries Per Second) Monitoring Thresholds:
    • Purpose: Configures thresholds for high and low DNS query rates to manage and monitor the query load on DNS appliances.

    • Process:
      • Access this setting by right-clicking a DNS appliance and selecting ‘Set QPS Thresholds’.

      • In the pop-up model, adjust the ‘High QPS Threshold’ between 10 to 10,000 for monitoring high query volumes, and ‘Low QPS Threshold’ between 0 to 100 for low volumes. Leave the field empty to disable the respective monitoring.

      • Finalize the configuration by clicking ‘OK’.

Common Functionalities

  • Refresh: Updates and displays the latest status of the appliances.

  • Column Visibility: Customize which columns are visible in the grid for streamlined viewing.

  • Reset Preferences: Resets any custom settings or filters applied to the grid to default settings.

  • More Options: Additional settings for further customization or operation on the grid.

Access and Permissions

  • User Role Dependency: The availability and accessibility of these functions are contingent upon the user’s role within the TCPWave IPAM system. For more information about specific roles and permissions, users should consult the ‘Administrator Roles’ section.

In summary, the Monitored Appliances feature in TCPWave IPAM offers network administrators a comprehensive and user-friendly interface for managing and monitoring the vital components of their network. By providing capabilities such as enabling/disabling monitoring and setting QPS thresholds, it equips administrators with the tools necessary to maintain optimal network performance and stability.

Monitored Services

The Monitored Services feature within TCPWave IPAM allows for comprehensive monitoring of the performance and health of various network appliances, including DNS, DHCP, and ADC appliances.

Overview of Monitored Services

  • Selective Monitoring: Users can choose to monitor specific DNS and DHCP appliances and IPAM performance parameters as needed.

  • Alert System: When predefined thresholds are met, the platform generates alerts, helping administrators proactively manage network appliances.

  • Configuration Dispatching: Once parameters are set or updated in IPAM, configurations are dispatched to remote appliances for monitoring.

  • Remote Appliance Management: Remote appliances receive monitoring configurations from the IPAM server, enabling checks such as hardware and process checks, file integrity, and DNS zone monitoring.

Monitored Services List

Service Name

Category

Description

Enabled By Default

Appliance Disk Space

Appliance Usage Threshold

Monitors the disk usage of the appliance.

Yes

Appliance Memory

Appliance Usage Threshold

Monitors the percentage of memory (RAM) used across host types.

Yes

Appliance CPU

Appliance Usage Threshold

Monitors CPU usage across all host types.

Yes

NTP Service

Appliance Components

Monitors the status of the NTP process on enabled host types.

No

BGP Service

DNS Appliance Components

Monitors the status of the BGP process running on enabled host types.

No

Zebra Service

DNS Appliance Components

Monitors the status of the Zebra process running on enabled host types.

No

Checks BGP Routes

DNS Appliance Components

Monitors if routes are properly advertised to the BGP peers.

No

Ping Status Check

Appliance Response

Monitors the ping status for all appliance types.

No

DNS Appliance Heart Beat

Appliance Heart Beat

Monitors the heartbeat on all DNS appliances.

No

DHCP Appliance Heart Beat

Appliance Heart Beat

Monitors the heartbeat on all DHCP appliances.

No

The above table lists only a few services. You can add additional rows for the rest of the monitored services available in TCPWave IPAM.

Note

For each service listed, you can provide additional details such as configuration parameters, possible issues, and any best practices for monitoring.

Monitoring Hierarchy

TCPWave’s advanced monitoring system provides a comprehensive view of the health and status of various system components, enabling network administrators to proactively manage and mitigate potential system issues. This system is designed to continuously monitor the state of all integrated appliances, such as IPAM, DNS, and DHCP, with the capability to alert administrators about abnormalities that might lead to system failures.

Accessing the Monitoring Hierarchy

  1. Navigation:

    To view the centralized health status of all appliances, navigate through the TCPWave IPAM interface to Infrastructure Management > Fault Management > Monitoring Hierarchy.

Features of the Monitoring Hierarchy Grid

The grid displays crucial information about each appliance in the network, organized into several columns for ease of understanding and analysis.

Key Columns in the Monitoring Hierarchy Grid

  1. Appliance Name:

    • Displays the specific name of each appliance.

  2. Appliance IP Address:

    • Shows the IP address assigned to each appliance.

  3. Appliance Type:

    • Indicates the type of each appliance, such as DHCP, BIND AUTH, DNS PROXY, etc.

  4. Appliance Groups:

    • Reveals the group name to which each appliance is assigned, aiding in organization and categorization.

  5. Configuration Status:

    • Shows the current configuration status of the appliance, with alerts indicating either OK or CRITICAL conditions.

    • Clicking on this status leads to the IPAM/DNS/DHCP Policy Compliance page, where detailed information and potential corrective actions can be accessed.

  6. Monitoring Status:

    • Displays the monitoring status with alerts such as OK, CRITICAL, or WARNING.

    • Clicking on this status redirects to the Current Alarms page, providing detailed insights into any active issues.

Additional Functionalities

  • Exporting Reports:

    Administrators can export the monitoring report in various formats, including PDF, CSV, and Excel, for documentation, analysis, or presentation purposes.

Summary

The Monitoring Hierarchy in TCPWave IPAM is a powerful tool for network administrators, offering a centralized, detailed view of the health and operational status of all network appliances. This feature not only facilitates quick identification of issues but also aids in swift navigation to relevant pages for deeper analysis and resolution. With this system, organizations can enhance their ability to preemptively address potential problems, ensuring robust network performance and reliability.

Performance management

IPAM Statistics

TCPWave’s Performance Management system provides a sophisticated suite of tools for monitoring and enhancing the performance and service levels of various system components. This system is pivotal in continuously assessing the health and status of network systems, providing timely alerts to potential issues.

Navigating to Performance Management

To access Performance Management:

  • Navigate to Infrastructure Management > Performance Management in the TCPWave interface.

  • In this section, you’ll find options like DHCP Statistics, DNS Statistics, and IPAM Statistics, with IPAM Statistics displayed by default.

IPAM Statistics

This section contains several tabs, each offering different insights into IPAM’s performance and activities:

  1. T-Message Statistics:

    • Displays statistics on messages exchanged between remote systems and the DDI Manager.

    • Covers various aspects such as DNS and DHCP configurations, Dynamic DNS Updates, Health Checks, etc.

    • Features an interactive chart with zoom functionality for detailed analysis.

  2. Recent Activity:

    • Shows individual activities performed on the IPAM for a specific time range.

    • Includes widgets for IPAM Events and Recent Commands, allowing for comprehensive activity monitoring and reporting.

  3. Scheduler Statistics:

    • Provides data on scheduled jobs, including job executions and detailed charts for the past 24 hours.

  4. Resource Utilization:

    • Offers insights into CPU, memory, disk utilization, and more.

    • Allows for daily, weekly, monthly, and half-yearly reports, with export options to PDF.

  5. Logs:

    • Logs of various types (WebServer Log, DDNS Log, Syslog, etc.) are accessible, offering in-depth analysis of different system activities.

    • Supports generation of detailed reports with export options.

  6. Last Sync Report:

    • Provides a tabular report of the last synchronization of all IPAM appliances, including details like Sync Time, Status, and Info.

Additional Features in Performance Management

  • DR Cluster Status: Shows the cluster health in a configured Disaster Recovery setup on the IPAMs.

  • HA Cluster Status: Displays cluster health in a configured High Availability setup on the IPAMs.

  • Common Functionalities: Includes features like Refresh, Column Visibility, and Reset Preferences across different sections.

Access Permissions

  • Access to these sections depends on user roles. Users can refer to the Administrator Roles for more information on their specific permissions.

Summary

TCPWave’s Performance Management is an integral part of ensuring optimal performance and health of the network infrastructure. It allows network administrators to gain a comprehensive understanding of various aspects like message exchanges, recent activities, resource utilization, and synchronization status of the system components. This proactive monitoring and detailed reporting capability are crucial for maintaining system efficiency and mitigating potential issues promptly.

Microsoft DHCP Statistics

Microsoft DHCP Statistics in TCPWave IPAM provide an in-depth analysis of the performance and health of Microsoft DHCP appliances. This feature is crucial for network administrators to efficiently manage and optimize their network’s DHCP operations by offering detailed insights into various aspects of DHCP performance, utilization, and health.

Charts Section

This section visualizes key performance metrics of Microsoft DHCP appliances. Follow these steps to generate the charts:

  1. Appliance Selection:

    • Choose a specific Microsoft DHCP appliance from the dropdown menu.

  2. Duration Selection:

    • Choose a time period for the data analysis: Daily, Weekly, or Monthly.

  3. Charts Displayed:

    • Appliance Load Usage: Shows the CPU usage for the selected appliance over the chosen time frame.

    • Appliance Memory Usage: Illustrates the memory usage trends.

    • Appliance Disk Usage: Details the disk space utilization.

    • Microsoft DHCP Query: Presents the types and volume of DHCP requests, aiding in identifying unusual request patterns that could signal issues like DDoS attacks.

    • Microsoft DHCP Response: Tracks DHCP responses, distinguishing between recursive and non-recursive queries.

    • Appliance ICMP: Displays ICMP communications for network diagnostics like ping and traceroute.

  4. Chart Features:

    • Each chart includes a menu icon offering the following functionalities:

      • Zoom: For detailed examination of specific parts of a chart.

      • PDF Export: Allows exporting individual charts as PDFs for reporting or further analysis.

Logs Section

The Logs section is essential for troubleshooting, providing event-related information on the DHCP appliance.

Generating Logs

Follow these steps to create a log report:

  1. Select Parameters:

    • Choose a specific DHCP appliance.

    • Define the start and end date and time for the log report.

  2. Log Details:

    • Date: Shows the date and time of each event.

    • Category: Categorizes events by severity (Information, Warning, Error, Critical).

    • Log: Provides detailed information about each recorded event.

Analysis and Troubleshooting

  • These logs are invaluable for diagnosing issues related to the DHCP appliance and understanding the underlying causes of errors or unusual activities.

Overall Functionality

  • Microsoft DHCP Statistics within TCPWave IPAM offers network administrators a powerful and comprehensive tool to proactively manage and monitor the DHCP infrastructure.

  • It integrates seamlessly into the fault management system, enabling administrators to respond promptly to potential issues and maintain a stable and efficient network environment.

Conclusion

This feature is vital for ensuring optimal DHCP performance, aiding in capacity planning, troubleshooting, and enhancing overall network reliability.

Microsoft DNS Statistics

The Microsoft DNS Statistics page in TCPWave IPAM offers a comprehensive view of the performance and activities of Microsoft DNS appliances. This feature is vital for network administrators to monitor and manage the network’s DNS infrastructure by providing insights into DNS appliance performance through various statistics. These insights assist in identifying trends, potential issues, and optimizing DNS operations.

Generating Charts for Microsoft DNS Appliance

Follow these steps to generate charts for a Microsoft DNS appliance:

  1. Appliance Selection:

    • Choose a specific Microsoft DNS appliance from a dropdown list.

  2. Time Frame Selection:

    • Select a duration for the analysis: Daily, Weekly, or Monthly.

  3. Charts Displayed:

    • Appliance Load Usage: Indicates the CPU usage over the selected time period.

    • Appliance Memory Usage: Shows memory usage trends.

    • Appliance Disk Usage: Displays disk space utilization.

    • Microsoft DNS Query: Presents types and volumes of DNS requests, useful for identifying abnormal request patterns that could indicate issues like DDoS attacks.

    • Microsoft DNS Response: Tracks DNS responses to recursive and non-recursive queries.

    • Appliance ICMP: Illustrates ICMP communications, used in network diagnostics tools like ping and traceroute.

  4. Chart Features:

    • Each chart has a menu icon for additional functionalities:

      • Zoom: Allows detailed examination of specific chart areas.

      • PDF Export: Enables exporting individual charts as PDFs for reporting or analysis.

Logs Section

The Logs section provides crucial data for troubleshooting and understanding the activities of the DNS appliance.

Generating Logs

Follow these steps to create a log report:

  1. Parameters Selection:

    • Choose the DNS Appliance and Log Type (Query Logs, DNS Audit Logs, or Windows Logs).

    • Define the log category (Application, Setup, Security, or DNS Server).

    • Specify the start and end date and time for the logs.

  2. Log Report:

    • Date: Indicates the date and time of each event.

    • Category: Classifies events by severity (Information, Warning, Error, Critical).

    • Source: Identifies the application logging the event.

    • Log Details: Provides in-depth information about each event.

Overall Functionality

  • Microsoft DNS Statistics within TCPWave IPAM is an essential tool for network administrators, offering detailed insights into DNS appliance performance and activities.

  • It integrates seamlessly with the fault management system, enabling early detection of potential issues and assisting in maintaining a stable and efficient DNS infrastructure.

In summary, this feature is crucial for ensuring the optimal performance of DNS services, aiding in capacity planning, troubleshooting, and enhancing network reliability. Through detailed statistical analyses and logs, network administrators can proactively manage and optimize their DNS infrastructure.

TCPWave DHCP Statistics

TCPWave’s DHCP Statistics offer a detailed analysis of the performance, utilization, and health of DHCP appliances. This section within TCPWave IPAM enables comprehensive monitoring and troubleshooting of DHCP systems, which is crucial for administrators to efficiently manage their network’s DHCP operations.

Collective Statistics

This tab provides a cumulative overview of DHCP traffic trends for all the DHCP appliances defined in the TCPWave IPAM application over different periods:

  • Charts Available: DHCP Daily, Weekly, and Monthly Cumulative Charts.

  • Purpose: Displays the volume of DHCP Discover, Offer, Request, Acknowledge, and Release Messages, assisting in identifying abnormal trends and potential DDoS attacks.

  • Zoom Feature: Users can zoom in and out on specific areas of the chart for a detailed view.

Charts

The Charts tab allows the generation of specific DHCP appliance performance charts:

  1. Select Chart Type: Either ‘Appliance’ or ‘Appliance & Category’.

  2. Choose Appliance: Select a DHCP appliance from the dropdown menu.

  3. Select Duration: Choose Daily, Weekly, or Monthly for data display.

  4. Display Options: Depending on the selected category, the charts can show Appliance Load, Memory, Disk Usage, DHCP Queries and Responses, Swap, Ping, Heartbeat, Heap Usage, and Traffic.

  5. Interactivity: Charts feature a menu icon for zooming and exporting to PDF.

Logs

The Logs tab provides access to various DHCP-related log types for in-depth analysis:

  1. Select Parameters: Choose a DHCP appliance, log type, and time frame.

  2. Types of Logs:

    • DHCP Lease Info

    • DHCP Task

    • DHCP TIMS Message

    • System Log

    • TCPWave DHCP Service Log

  3. Output: Logs are displayed in a grid with sortable columns like Date, Category, Source, and Log details.

  4. Paths: Specific paths are provided for each log type for direct access.

    • DHCP Task: /opt/tcpwave/timsdhcp/logs/DHCPTask.log

    • System Log: /var/log/messages

    • Lease Info: /opt/tcpwave/timsdhcp/logs/DHCPMessages.log

    • DHCP TIMS Message: /opt/tcpwave/timsdhcp/logs/DHCPtimsmsg.log

    • TCPWave DHCP Service Log (KEA_DHCP): /var/log/kea-dhcp4.log

    • TCPWave DHCP Service Log (ISC): /var/log/dhcpd.log

Top Talkers

This feature shows the top 10 most active entities in DHCP communication, providing insights into the most frequently communicating devices or nodes.

Last Sync Report

Displays the latest synchronization report for all DHCP Appliances, including details like Sync Time, Appliance Name, IP, Type, and Status.

Scopes

Presents a detailed view of DHCP scopes, showing the effective utilization of IP addresses within each scope.

Common Functionalities

Across these tabs, users have access to standard functionalities like:

  • Refresh: To update the displayed data.

  • Column Visibility: Customizing the columns displayed in grids.

  • Reset Preferences: Reverting to default settings.

  • Export Options: Exporting data in various formats like PDF, Excel, and CSV.

TCPWave’s DHCP Statistics page in the IPAM platform is a comprehensive tool that empowers network administrators with detailed insights and the ability to proactively manage and optimize their DHCP infrastructure. By offering a mix of cumulative data, interactive charts, extensive logs, and synchronization reports, it ensures robust DHCP performance and enhanced network management.

TCPWave DNS Statistics

The DNS Statistics page in TCPWave IPAM offers network administrators extensive insights into the DNS infrastructure’s performance and activities. This feature provides detailed monitoring, fault management integration, and reporting capabilities, making it a powerful tool for managing and optimizing DNS operations.

Tabs Overview

The DNS Statistics page contains the following tabs:

  • Collective Statistics

  • Charts

  • Logs

  • Top Talkers

  • Last Sync Report

Collective Statistics

This tab displays cumulative DNS traffic trend charts for all appliances in the TCPWave IPAM application over the last 24 hours:

  • DNS Authoritative (Cumulative): Tracks cumulative authoritative DNS traffic.

  • DNS Cache (Cumulative): Monitors cumulative DNS cache traffic.

  • DNS Proxy (Cumulative): Shows cumulative DNS proxy traffic.

Functionality: - Identifies abnormal trends in DNS requests across the infrastructure. - Integrated with fault management for alerting potential DDoS attacks.

Interactive Features: - Zoom in/out using an overview plot, allowing detailed inspection of specific time periods.

Charts

Users can generate different types of charts based on selected parameters:

  • Appliance Chart: Choose a DNS appliance and a time duration (daily, weekly, monthly) to generate relevant charts.

  • Appliance & Category Chart: Select an appliance and a specific category (Appliance Load, Memory, Disk Usage, DNS Query/Response, etc.) to view corresponding data over selected timeframes.

Logs

The Logs section provides access to various logs for detailed analysis:

  • DNS Log: Displays DNS service and error information. Named differently based on appliance type (named.log, unbound.log, nsd.log).

  • Query Log: Shows incoming DNS query information.

  • DNSTAP Log: Available for certain appliance types, showing logs from DNSTAP.

  • DNS Task: Logs related to DNS process actions.

  • DDNS Updates: Shows Dynamic DNS update messages.

  • DNS TIMS Message: Logs for message queue communications between IPAM and DNS appliance.

  • System Log: General system management, security, and debugging messages.

  • ML Suspicious Query Log: Logs anomalous queries detected by an anomaly detection service.

  • Signature Suspicious Query Log: Shows activities flagged by the Intrusion Prevention System (IPS).

Log Paths: - DNS Log: /opt/tcpwave/chroot/var/named/log/named.log - Query Log: /opt/tcpwave/chroot/var/named/log/query.log - DNSTAP Log: /opt/tcpwave/chroot/var/named/log/dnstap.log - DNS Task: /opt/tcpwave/timsdns/logs/DNSTask.log - DDNS Updates: /opt/tcpwave/timsdns/logs/RemoteDDNS.log - DNS TIMS Message: /opt/tcpwave/timsdns/logs/DNStimsmsg.log - System Log: /var/log/messages - ML Suspicious Query Log: /opt/tcpwave/timsdns/logs/tcpwave-anomaly-detect.log - Signature Suspicious Query Log: /opt/tcpwave/var/log/suricata/fast.log

Report Generation: - Users can select appliance, log type, start and end date/time to generate a report.

Additional Operations: - Export, copy, print logs, adjust column visibility, reset preferences, and search functionality are available.

Top Talkers

  • Displays the top 10 DNS top talkers, providing insights into the most active DNS appliances.

  • Report Generation: Select a DNS appliance and generate a report to analyze the data.

Last Sync Report

  • Shows the last synchronization report of all DNS appliances.

  • Report Contents: Includes Sync Time, Appliance Name, IP, Type, Status, and Last Updated time.

  • Operations: Similar to the Logs section, it allows for exporting, copying, printing data, adjusting visibility, resetting preferences, and searching through the report data.

Summary

This DNS Statistics page is a robust tool for network administrators, providing extensive data and insights into the DNS infrastructure. The integration with fault management and detailed reporting capabilities highlights its usefulness in both routine monitoring and addressing specific network issues or threats.

TCPWave SLB Statistics

The TCPWave SLB Statistics page provides network administrators with statistical insights and analysis tools for Server Load Balancing (SLB) appliances. It is organized into several tabs for monitoring and managing SLB appliance performance and operations effectively.

Tabs Overview

The SLB Statistics page contains the following tabs:

  • Resource Utilization

  • Logs

  • Top Talkers

  • Last Sync Report

Resource Utilization

Chart Generation: - Appliance Chart: Select an SLB appliance and time frame (daily, weekly, monthly) to generate specific charts. - Appliance & Category Chart: Further break down statistics by selecting a category (CPU Usage, Memory Utilization, Disk Utilization, Swap, Ping, Heartbeat, Heap Usage, Network Bandwidth Rate, Network Packet Rate, Total Connections).

Interactive Features: - Each chart includes a menu icon for zooming and exporting the chart as a PDF.

Menu Icon Options: - Zoom: Allows users to view the individual chart at a zoomed level for detailed inspection. - PDF: Generates the individual chart as a PDF file for reporting and analysis.

Logs

Log Types: - GSLB DNS Log: Records DNS queries and responses for Global Server Load Balancing. - GSLB Task Log: Monitors Global Server Load Balancing activities. - Proxy Log: Provides details for monitoring load balancing and application delivery. - SLB Appliance Log: Information on appliance operations for troubleshooting. - System Log: Covers system management, security auditing, and general debugging. - WAF Log: Records unauthorized or harmful requests to web applications.

Report Generation: - Choose an SLB appliance, log type, and time range to generate reports, viewable in tabular format.

Additional Features: - Export logs to PDF, Excel, CSV; copy, print logs; column visibility adjustments; reset preferences; and search functionality.

Top Talkers

  • Functionality: Identifies the top 10 ADC Top Talkers in the network, providing insights into the most active connections and communication paths.

  • Report Generation: Select an SLB appliance and generate a report for in-depth analysis.

Last Sync Report

  • Report Overview: Displays the latest synchronization data for all SLB appliances in a table format.

  • Columns: Sync Time, Appliance Name, IP, Type, Status, and Last Updated time.

  • Operations: Similar to the Logs tab, it supports exporting to PDF, Excel, CSV; copying, printing data; adjusting column visibility; resetting preferences; and searching through the data.

Summary

Each section of the SLB Statistics page is designed to provide comprehensive insights into the performance, usage, and operational status of SLB appliances within the network infrastructure. These tools aid in the effective monitoring, management, and optimization of network load balancing.